Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrated secure watermark detection and privacy preserving storage in the compressive sensing domain., , and . WIFS, page 67-72. IEEE, (2013)Scalable Summarization for Knowledge Graphs with Controlled Utility Loss., , and . DEXA (1), volume 14146 of Lecture Notes in Computer Science, page 21-36. Springer, (2023)A Compressive Sensing Based Secure Watermark Detection and Privacy Preserving Storage Framework., , and . IEEE Trans. Image Process., 23 (3): 1317-1328 (2014)Mobile Media in Action: Remote Target Localization and Tracking., , and . IEEE Multim., 19 (3): 74-80 (2012)Compressive sensing based secure multiparty privacy preserving framework for collaborative data-mining and signal processing., , and . ICME, page 1-6. IEEE Computer Society, (2014)NA-MEMD Is Actually What You Need for Computational Pulse Analysis., , , , , and . IEEE Access, (2022)An Efficient Lossless Graph Summarization Method for Large Streaming Graphs., , and . SEKE, page 311-316. KSI Research Inc., (2023)Overview of the OMA Secure Content IDentification Mechanism., , , and . ICME, page 1370-1375. IEEE Computer Society, (2010)Video Based Real-World Remote Target Tracking on Smartphones., , , , and . ICME, page 693-698. IEEE Computer Society, (2012)Positionit: an image-based remote target localization system on smartphones., , , , and . ACM Multimedia, page 821-822. ACM, (2011)